In the past, Computer Network Defense (CND) intended to be minimally intrusive to the other requirements of IT development, business, and operations. This paper outlines how different security paradigms have failed to become effective defense approaches, and what the root cause of the current situation is. Based on these observations, a different point of… (More)
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
“Does not compute” was a catchphrase in old science fiction works. It was mostly uttered by robots that were in the unfortunate situation of having to understand the human conditions in computational logic. The robots frequently exploded in such cases. IT-security finds itself in a similar situation. It has to understand a new situation: a revolutionary… (More)